{"api_version":"1","generated_at":"2026-04-22T16:07:23+00:00","cve":"CVE-2023-38035","urls":{"html":"https://cve.report/CVE-2023-38035","api":"https://cve.report/api/cve/CVE-2023-38035.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-38035","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-38035"},"summary":{"title":"Ivanti Sentry Authentication Bypass Vulnerability","description":"A security vulnerability in MICS Admin Portal in Ivanti MobileIron Sentry versions 9.18.0 and below, which may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration.","state":"PUBLIC","assigner":"support@hackerone.com","published_at":"2023-08-21 17:15:00","updated_at":"2023-09-13 18:15:00"},"problem_types":["CWE-863"],"metrics":[],"references":[{"url":"https://forums.ivanti.com/s/article/CVE-2023-38035-API-Authentication-Bypass-on-Sentry-Administrator-Interface","name":"https://forums.ivanti.com/s/article/CVE-2023-38035-API-Authentication-Bypass-on-Sentry-Administrator-Interface","refsource":"MISC","tags":[],"title":"Ivanti Community","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://packetstormsecurity.com/files/174643/Ivanti-Sentry-Authentication-Bypass-Remote-Code-Execution.html","name":"http://packetstormsecurity.com/files/174643/Ivanti-Sentry-Authentication-Bypass-Remote-Code-Execution.html","refsource":"MISC","tags":[],"title":"Ivanti Sentry Authentication Bypass / Remote Code Execution ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-38035","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38035","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"38035","vulnerable":"1","versionEndIncluding":"9.18.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ivanti","cpe5":"mobileiron_sentry","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":{"cve_year":"2023","cve_id":"38035","cve":"CVE-2023-38035","vendorProject":"Ivanti","product":"Sentry","vulnerabilityName":"Ivanti Sentry Authentication Bypass Vulnerability","dateAdded":"2023-08-22","shortDescription":"Ivanti Sentry, formerly known as MobileIron Sentry, contains an authentication bypass vulnerability that may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration.","requiredAction":"Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.","dueDate":"2023-09-12","knownRansomwareCampaignUse":"Known","notes":"https://forums.ivanti.com/s/article/CVE-2023-38035-API-Authentication-Bypass-on-Sentry-Administrator-Interface?language=en_US ;  https://nvd.nist.gov/vuln/detail/CVE-2023-38035","cwes":"CWE-863","catalogVersion":"2026.04.21","updated_at":"2026-04-21 13:32:18"},"epss":{"cve_year":"2023","cve_id":"38035","cve":"CVE-2023-38035","epss":"0.944190000","percentile":"0.999790000","score_date":"2026-04-21","updated_at":"2026-04-22 00:07:42"},"legacy_qids":[{"cve":"CVE-2023-38035","qid":"730875","title":"Ivanti Sentry Authentication Bypass Vulnerability (Zero Day)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-38035","ASSIGNER":"support@hackerone.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A security vulnerability in MICS Admin Portal in Ivanti MobileIron Sentry versions 9.18.0 and below, which may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration. "}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Ivanti","product":{"product_data":[{"product_name":"MobileIron Sentry","version":{"version_data":[{"version_affected":"<","version_name":"9.18.0 and below","version_value":"9.18.0 and below"}]}}]}}]}},"references":{"reference_data":[{"url":"https://forums.ivanti.com/s/article/CVE-2023-38035-API-Authentication-Bypass-on-Sentry-Administrator-Interface","refsource":"MISC","name":"https://forums.ivanti.com/s/article/CVE-2023-38035-API-Authentication-Bypass-on-Sentry-Administrator-Interface"},{"url":"http://packetstormsecurity.com/files/174643/Ivanti-Sentry-Authentication-Bypass-Remote-Code-Execution.html","refsource":"MISC","name":"http://packetstormsecurity.com/files/174643/Ivanti-Sentry-Authentication-Bypass-Remote-Code-Execution.html"}]}},"nvd":{"publishedDate":"2023-08-21 17:15:00","lastModifiedDate":"2023-09-13 18:15:00","problem_types":["CWE-863"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ivanti:mobileiron_sentry:*:*:*:*:*:*:*:*","versionEndIncluding":"9.18.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}